Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Iterative Integral Equation Method for Efficient Computation of Multiple Scattering

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3372
Xiaoyan Zhang , Zhiwei Liu , Shan He , Yingting Liu , Yueyuan Zhang
An iterative integral equation method (IEM) is proposed for calculation of the electromagnetic (EM) scattering field from geometries with multiple reflections, such as rough surface, dihedral and trihedral. The first reflection is computed by physical optics and the coupling effects are computed by integral equations. The average size of the triangular meshes used in the proposed method is a constant value while that in method of moment is a linear function of wavelength. As a result, compared with method of moment, the proposed method will lead to less number of unknowns for electrically large geomety. Accordingly, this method is more efficient and suitable for fast computation of scattering from electrically large geometry. Further more, when compared with high frequency asymptotic method, the proposed method is more accurate. The numerical results demonstrate that this method is accurate for computation scattering with multiple reflections and efficient for electrically large object. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4932
Volume: 12
Issue: 4
Page: 3208-3213
Publish at: 2014-04-01

An Efficient Approach based on Hierarchal Ontology for Service Discovery in Cloud Computing

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3335
Naji Hasan.A.H , Gao Shu , AL-Gabri Malek , Jiang Zi-Long
As service providers publish their web services in clouds environment, selecting the most appropriate service among these clouds becomes a very difficult challenge. This paper proposes an efficient approach based on hierarchal ontology to facilitate service discovery in cloud computing. Concepts of services and their relations, which describe services semantically, are distributed in a hierarchal ontology. In addition a matching mechanism for matching these concepts in order to match services in clouds is proposed. The matching results will be evaluated by the QoS of services to select the appropriate service among matched services. A case study is presented to prove the efficiency of our approach. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4850
Volume: 12
Issue: 4
Page: 2905-2913
Publish at: 2014-04-01

On the Algebraic Immunity of Boolean Function

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3347
Cao Hao , Wang Huige
In view of the construction requirements of Boolean functions with many good cryptography properties, through the analysis of the relationship between the function values on the vectors with weight not more than d  and the algebraic immunity, a method to determine the higher order algebraic immunity function is given. Meanwhile, a method that appropriate change in the function value without reducing algebraic immunity is produced, and using it, an example to construct Boolean function with optimal properties in the algebraic immunity, nonlinearity, balance and correlation immunity etc is presented. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4773
Volume: 12
Issue: 4
Page: 3010-3014
Publish at: 2014-04-01

Research on Design Method Based on Hardware Encryption and Two-way ID Authentication for Security Mobile Hard Disk

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3344
Huanchun Yang
The design Method of the " Security Mobile Hard Disk Based on Hardware Encryption and Two-way ID Authentication" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; that the key of the encryption system will be loaded before the system initialization (system boot) prevents malicious code attacks from hard drive, and even when the mobile hard disk was stolen, the thief cannot read out any encrypted data from it  on any other computer as long as the thief has no access to the encryption key. Therefore, this "encrypted mobile hard disk" is more secure with better reading and writing performance, and thus can effectively protect Important and sensitive data on the mobile hard disk. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4995
Volume: 12
Issue: 4
Page: 3001-3009
Publish at: 2014-04-01

Robust Adaptive Fuzzy Sliding Mode Control Based on Fuzzy Compensation for Ammunition Auto-loading Robot

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3299
Yufeng Li , Kuiwu Li , Yutian Pan , Kelei Li
Aimed at the problems of low control accuracy and weak robustness influenced by external disturbance, friction, load changes, modeling errors and other issues in ammunition auto-loading robot control system, a new robust adaptive fuzzy sliding mode controller based on fuzzy compensation is proposed. The control architecture employs fuzzy systems to compensate adaptively for plant uncertainties to distinguish different disturbance compensation terms and approximate each of them respectively. The stability of the robust adaptive fuzzy sliding mode control (SMC) and the convergence of the tracking errors are ensured by using the Lyapunov theory. By analyzing and comparing the simulation results, it is obviously shown that the control system can lighten the effect on the control system caused by different disturbance factors and eliminate the system chattering instead of traditional SMC. As a result, the control system has great dynamic features and robust stability and meets the requirement that the actual motion of ammunition auto-loading robot quickly tracks the scheduled trajectory. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4342
Volume: 12
Issue: 4
Page: 2613-2621
Publish at: 2014-04-01

Analysis on Channel Capacity of Transform Domain Communication System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3321
Wei Naiqi , Chen Zili , Lv Junwei , Zhu Anshi
Transform Domain Communication System (TDCS) has caught attention for its characteristics of flexible spectrum application, excellent anti-interference performance and low interception probability. Analysis on channel capacity is one aspect of important basic theory research for TDCS. The fundamental principle of TDCS is studied at first. Then the channel capacity model of TDCS is deduced and built on the background of Gaussian white noise channel with typical interference. The channel capacity of TDCS under different spectrum sensing methods is investigated on the basis of the model. The research indicates that the spectrum sensing methods based on AR model and wavelet-packet transform make more improvement for TDCS channel capacity. Therefore, from the perspective of maximizing TDCS channel capacity, the spectrum sensing methods based on AR model and wavelet-packet transform can be adopted. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4112
Volume: 12
Issue: 4
Page: 2790-2796
Publish at: 2014-04-01

An Intelligent Course Scheduling Model Based on Genetic Algorithm

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3342
Guofeng Qin , Haibin Ma
With the university expansion, how to maintain teaching order using limited resources make the intelligent course scheduling become a multiple-constraint and multi-objective optimization problem. Traditional intelligent course scheduling algorithm is inefficient, cannot solve curriculum conflict question and meet the requirements of the modern university education management. Given this situation, this paper analyzes the university timetabling problem, and establishes a general course scheduling model; then proposes an improved genetic algorithm to sovle the intelligent course scheduling problem. It can meet all of the education resources’ constraints and the teachers’ personal demands as much as possible. Test the performance of between the improved genetic algorithm and simple genetic algorithm under different scenarios, the experimental results show that the improved genetic algorithm has better performance, can schedule courses reasonable. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4798 
Volume: 12
Issue: 4
Page: 2985-2994
Publish at: 2014-04-01

A Multi-party Decision Hot-standby Model

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3377
Congdong Lv , Wei Ma , Xiaoyong Li
The dual server hot-standby mechanism is often used to improve the system availability. However, in traditional dual server hot-standby models, the states of servers are seldom determined from the client’s observation, and it’s easy for the master server and the slave server to make wrong decisions about the state of each other, which may cause split brain. This paper presents a multi-party decision hot-standby model. In this model, the master server and the slave server determine the state of each other not only from the observation of themselves, but also from the observation of the client, which helps them make correct decision to maintain or change the service platform, so as to ensure the continuity of application. Compared with traditional dual server hot-standby models, the model suggested in this paper is more reasonable because of the involvement of the client’s observation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4887
Volume: 12
Issue: 4
Page: 3247-3252
Publish at: 2014-04-01

Process Model and Digitalization of the Coal Gas Outburst Prevention

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3331
Shao-jie Hou , Yu-wei Zhang , Yuan-ping Cheng
Regional coal gas outburst prevention has become the prerequisite of coal mining in the most China underground collieries. It touched on miners’ lives so closely, but especially lacked of digitalization due to the hostile working environment, sightless strata reserves, complicated and long-time workflow. By synthesizing the vital rules issued by China governments and various techniques of coal gas outburst prevention, we proposed a novel process model for them embodied as a logical workflow. The model consisted of two operation links and two judging nodes, and dealt with three types of data. Then an easy-use and practical process data management software system was developed. By testing in Qinan colliery, the system was proved to be fully considering user experience and helpful to promote digitalization of coal gas outburst prevention. Compared with the traditional management, the digitalization might help engineers identify anomalies more quickly and avoid gas accidents in time. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4240
Volume: 12
Issue: 4
Page: 2875-2881
Publish at: 2014-04-01

The Combined Forecasting Model of Discrete Verhulst-BP Neural Network Based on Linear Time-Varying

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3374
Shang Hongchao , Long Xia , He Tingjie
Firstly, this paper, aiming at the problem of errors produced by the transformation of differential equation directly into difference equation from traditional gray Verhulst model,through generating reciprocal for the original data sequence, constructs the discrete Vrhulst model based on linear time-varying(LTDVM model);And then we, taking the LTDVM predicted value as an input value and the original data as a mentor training value, put forward the combined forecasting model of discrete Verhulst-BP neural network based on linear time-varying. Meanwhile, in order to improve the training speed and agility and effectively avoid the saturation region of S-type function, this article normalized in advance the input data and mentor training values to better ensure the usefulness, self-learning ability and fault tolerance of the model. At last, we will study the cases to demonstrate that the model has high modeling and forecasting accuracy. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4938
Volume: 12
Issue: 4
Page: 3224-3229
Publish at: 2014-04-01

Attack the Anycast Signature Scheme

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3371
Jinbin Zheng
Today, the internet is increasingly being considered to provide services, and not just in order to connect. As this view became more universal, the important factors of providing such services are reliability and availability of the services to meet the needs of a large number of users. Anycast is a communication mode in which the same address is assigned to a group of servers and the router will send the request to the ”best” server. Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4931
Volume: 12
Issue: 4
Page: 3200-3207
Publish at: 2014-04-01

Switching Surface Design for Nonlinear Systems: the Ship Dynamic Positioning

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3278
Diallo Thierno Mamadou Pathe , Hongsheng Li , Guangrong Bian
In this paper a design of the switching-surface for the nonlinear system is studied. The aim was to prove that with the linear matrix inequality the coefficients of the sliding surface can be determined optimally for the control law structure. The advantages of the use of the linear matrix inequality reside in the accurate determination of the coefficients of the sliding surface. The sliding mode control for dynamic positioning of the ship with our proposed switching-surface is done. The objective of this control was to make sure that the ship follows a predetermined track. The good trackings are observed from the simulation results which confirm the robustness of the control law obtained by our proposed switching-surface. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4739
Volume: 12
Issue: 4
Page: 2439-2447
Publish at: 2014-04-01

Performance Analysis of Voltage Stability Against Sudden Load Changes in Voltage Controlled Inverters for Distributed Generation

10.11591/ijape.v3.i1.pp33-40
Arvind H. Kadam , Keerthi Unni , Sushil Thale
Distributed Generation (DG) is playing an important role in the field of electricity generation by being a viable alternative to the Centralized Power Generation (CPG). Although, distributed generation has many advantages, it has some issues in the fields of protection, power control, stability, islanding detection etc. Amongst all the issues, this paper attempts to highlight the issue of voltage stability under sudden changes in loading conditions in a distributed generation systems operating in stand-alone mode. Proper design and tuning of compensators for closed loop operation in DG systems can ensure voltage stability. As the load demand increases, the output voltage of DG usually dips for a short time owing to the weak (smaller capacity) nature of renewable sources, after which it returns to steady state. This fall in the voltage profile could prove to be harmful if the settling time is more. The simulation and hardware results illustrate that, accurate compensator design, is one of the key factor in maintaining the voltage stability in DG system. This paper explores the effect of proper compensator design in maintaining voltage stability of DG.
Volume: 3
Issue: 1
Page: 33-40
Publish at: 2014-04-01

Implementation of Dynamic Time Warping Method for the Vehicle Number License Recognition

https://ijece.iaescore.com/index.php/IJECE/article/view/5569
Made Sudarma , Sri Ariyani
In the era of information technology vehicle numbers identification needs to be done by system automatically. Therefore, the accuracy of the data is well documented and work porses identification can be done quickly. Motor vehicle license recognition is a recognition system by comparing character feature in license plate with reference feature which exists in database. This system uses chain code method and template matching to extract character feature in license plate’s image. Feature extraction with chain code method will result in an array of direction codes which stored in dynamic array, which stored in dynamic array. In this application test feature will be matched with feature stored in database using dynamic time warping method (DTW) to obtain a distance value between test feature and reference feature, the smaller the distance obtained shows that both the features are more similar. The result of this system is the recognition of each character in license plate’s image. In this study, samples of license plate’s images are tested with the number of research objects. From the study feature extraction is obtained with template matching method provides better success rate compared to feature extraction with chain code method, where the success rate of feature extraction with template matching method is at 78% whereas feature extraction with chain code method is at 68%.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5169
Volume: 4
Issue: 2
Page: 278-284
Publish at: 2014-04-01

Fuzzy Logic Controller Based Single Buck Boost Converter for Solar PV Cell

10.11591/ijape.v3.i1.pp1-8
Krishnan Manickavasagam
This paper deals with solar power production controlled by Fuzzy Logic Controller (FLC) and Single Input Buck-Boost (SIBB) converter. Since the solar energy is continuously varying, according to the irradiation the FLC generates control pulses to switch on the MOSFET device. To analyze the real time feasibility of this method, the system is simulated by using                    MATLAB/Simulink 2010a. A simulation model of the system is developed with solar Photovoltaic (PV) cell, FLC and SIBB in contradiction of the real world conditions. The results are presented and discussed in this paper.
Volume: 3
Issue: 1
Page: 1-8
Publish at: 2014-04-01
Show 1820 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration